Updated: 2025-11-10 01:02:02.82713
Description:
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | 0.0 | |
| CVSS Version 3.x | HIGH | 7.5 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| AlmaLinux 9.2 ESU | httpd | 2.4.53 | 7.5 | HIGH | Released | CLSA-2024:1716915132 | 2024-05-28 14:18:46 | |
| AlmaLinux 9.2 ESU | mod_http2 | 1.15.19 | 7.5 | HIGH | Released | CLSA-2025:1762784415 | 2025-11-10 16:26:01 | |
| CentOS 7 ELS | httpd | 2.4.6 | 7.5 | HIGH | Not Vulnerable | 2025-02-09 00:26:13 | Not vulnerable | |
| CentOS 8.4 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2024:1716923768 | 2024-05-28 17:19:32 | |
| CentOS 8.5 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2024:1716924362 | 2024-05-28 17:19:30 | |
| CentOS Stream 8 ELS | httpd | 2.4.37 | 7.5 | HIGH | Released | CLSA-2024:1728932179 | 2024-10-14 17:46:55 | |
| CloudLinux 7 ELS | httpd | 2.4.6 | 7.5 | HIGH | Not Vulnerable | 2024-09-09 12:12:35 | ||
| Debian 10 ELS | apache2 | 2.4.59 | 7.5 | HIGH | Already Fixed | 2025-10-24 01:51:58 | ||
| Oracle Linux 7 ELS | httpd | 2.4.6 | 7.5 | HIGH | Not Vulnerable | 2025-02-08 22:48:55 | ||
| Ubuntu 16.04 ELS | apache2 | 2.4.18 | 7.5 | HIGH | Released | CLSA-2024:1725012024 | 2024-08-30 12:27:12 |